With the World's Leading Security Companies and Experts
Network-Based Security Research Center

Security Research Center

Cyber-attacks, which attempt to infiltrate the systems of government agencies and private companies and steal confidential information such as intellectual property and personal information, are becoming more sophisticated and intensifying, and the damage caused by such attacks has become a major social problem. I'm here. “I want to do something about this situation.” “I want to make cyberspace safe for everyone.” With that mission in mind, Macnica,Inc. established the Security Research Center in 2013 as a pure research institute independent of its business divisions. We are working on research on cyberattacks, which is attracting attention from all over the world.

Sophisticated Cyber-Attacks are Dealt with with Both Technical and Informational Power

Why did Macnica,Inc. launch the Security Research Center? There are two reasons for that. The first was that the efforts of a single private company and existing security measures were no longer enough to deal with the rapidly increasing number of targeted attacks at the time. Attackers ignore the law and ethics and use all kinds of techniques and means to steal information. Against such an attack, the defending side is at an overwhelming disadvantage. To counter such attacks, companies, universities, governments, NPOs, and all other organizations need to combine their strengths.

Macnica,Inc. has strong connections with the world's top security companies and the world's leading experts. Based on the knowledge we gained there, it is also an important mission for us to deliver selected cutting-edge information to Japan.

Utilizing Research Results to Propose Optimal Solutions to Cyber Threats

Another reason for establishing the Security Research Center was that in order to propose appropriate cybersecurity measures to our customers, we first had to fully understand who was attacking and what method they were using. .

There are three main types of cyber attacks. Cyber espionage activities that attempt to steal confidential information from government agencies and private companies, cyber crimes that target unspecified numbers for financial purposes, and social and political manifestations and sabotage known as hacktivism. It's a cyber attack. In addition, depending on the country, the situation varies greatly depending on what kind of attack you are receiving and from whom. Therefore, in order to deal with attacks that have landed in Japan from overseas, it is necessary to investigate and analyze not only overseas damage cases but also the damage situation in Japan. However, compared to security-advanced nations such as the United States and Israel, research into cyberattacks in Japan still lags behind. Therefore, the Center is also focusing on research and analysis of cyberattacks sent to Japan from overseas.

In addition, we share the knowledge obtained through research within the company and use it to improve the skills of our engineers and propose security solutions. Macnica,Inc. offers the latest services such as the "Threat Hunting Service," which discovers malware hidden within an organization, and the "Attack Surface Management Service," which uses the same perspectives and techniques as attackers to find externally published assets that are believed to belong to customers. We also offer the services of

At a Prestigious Conference,
Disseminate World-Class Research Results

The Security Research Center is also focusing on disseminating information. We have partnered with some of the world's leading security companies to investigate attacks that have actually landed and research the methods of cyberattacks, which are becoming increasingly sophisticated. We have already produced world-class research results, and our researchers have made presentations at prestigious international conferences.
For example, a researcher exhibited a tool for simulating attacks at a world-famous conference called "Black Hat." This is the first time for a Japanese to do so. Other researchers have also been invited to give lectures in Japan and overseas, presenting the results of their research.

In Japan, the Center also collaborates with industry, government, and academia to promote efforts to make cyberspace safer. I would like to raise the level of security measures in Japan and eventually export those solutions to the world. That's our dream.


  • Research on Targeted Attacks Landing in Japan
  • Research on Attack Surface Management
  • Research on SMS Phishing
  • Business Email Compromise Research
  • Incident response
  • Threat Hunting
  • Macnica-CIRT
  • Malware Analysis

Achievements (partial)

international conference

・Black Hat USA Arsenal 2013 – 2016、2023
・Mandiant Cyber Defense Summit 2021
・VB2020 localhost
・CONFidence 2020
・HITCON Pacific 2018
・BSides Austin 2018
・Black Hat Asia Arsenal 2017
・DEF CON 25 Demo Labs 2017

Domestic conference

・Japan Security Analyst Conference 2018, 2021, 2022, 2023
・B Sides Tokyo 2023
・(ISC)² Japan Chapter Annual Conference 2022
・The Sasakawa Peace Foundation Cyber Security Seminar 2019, 2021
・Information Security Workshop in Echigo Yuzawa 2021
・Shirahama Symposium 18th

Other social activities

・Security Camp National Conference Lecturer
・Government Security Advisor
・Researcher, Keidanren 21st Century Policy Research Institute
・FY2021 Multinational Cyber Defense Competition
・Management of security community Hamasekku

Supervised translation of books

・Incident response 3rd edition

threat research

Security Research Center Blog

achievement images

Security Report

Actual state of targeted attacks and countermeasure approaches 7th edition Trends in cyber espionage targeting Japan FY2021
Actual state of targeted attacks and countermeasure approaches 6th edition Trends in cyber espionage targeting Japan FY2021
Attack Trends and Solutions Targeting Domestic Corporate Websites
Actual state of business email fraud and countermeasure approach

Security Research Center Blog

Macnica,Inc. original information on security is uploaded.

Security Related Information

Also check this